Security Issues Due to Vulnerabilities in the Virtual Machine of Cloud Computing

被引:0
作者
Bhagat, Swapnil P. [1 ]
Patil, Vikram S. [2 ]
Meshram, Bandu B. [1 ]
机构
[1] Veermata Jijabai Technol Inst VJTI, Mumbai, Maharashtra, India
[2] SIES Grad Sch Technol, Navi Mumbai, India
来源
INTELLIGENT COMPUTING AND COMMUNICATION, ICICC 2019 | 2020年 / 1034卷
关键词
Virtual machine; Vulnerabilities; Security threats; Defense mechanism;
D O I
10.1007/978-981-15-1084-7_60
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The virtual machine is a medium for provisioning cloud resources to customers. Cloud customers are accountable for configuration and security of the applications and the operating system running on virtual machines. The responsibilities of cloud customers include inbound and outbound traffic flow, access control, security configuration and practices. This work analyzes the vulnerabilities inside the virtual machine and security threats engendered due to it. Some of the security threats on a virtual machine are demonstrated with practical implementation on Amazon Web Service (AWS) as a cloud service provider. This paper also discusses general defense mechanisms for these security threats in a virtual machine.
引用
收藏
页码:625 / 634
页数:10
相关论文
共 12 条
[1]  
[Anonymous], 2017, CLOUD SECURITY ALLIA
[2]  
Chiu D., 2014, TREND MICRORESEARCH
[3]   Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques [J].
Dykstra, Josiah ;
Sherman, Alan T. .
DIGITAL INVESTIGATION, 2012, 9 :S90-S98
[4]   An analysis of security issues for cloud computing [J].
Hashizume, Keiko ;
Rosado, David G. ;
Fernandez-Medina, Eduardo ;
Fernandez, Eduardo B. .
JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2013, 4 (01) :1-13
[5]   Cloud Computing Security: A Survey [J].
Khalil, Issa M. ;
Khreishah, Abdallah ;
Azeem, Muhammad .
COMPUTERS, 2014, 3 (01) :1-35
[6]   A survey and taxonomy of DoS attacks in cloud computing [J].
Masdari, Mohammad ;
Jalali, Marzie .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) :3724-3751
[7]   A survey on security issues and solutions at different layers of Cloud computing [J].
Modi, Chirag ;
Patel, Dhiren ;
Borisaniya, Bhavesh ;
Patel, Avi ;
Rajarajan, Muttukrishnan .
JOURNAL OF SUPERCOMPUTING, 2013, 63 (02) :561-592
[8]   Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review [J].
Modi, Chirag N. ;
Acha, Kamatchi .
JOURNAL OF SUPERCOMPUTING, 2017, 73 (03) :1192-1234
[9]  
Orr D.A., 2018, J FORENSIC SCI CRIM, V10
[10]   Classifying malware attacks in IaaS cloud environments [J].
Rakotondravony, Noelle ;
Taubmann, Benjamin ;
Mandarawi, Waseem ;
Weishaupl, Eva ;
Xu, Peng ;
Kolosnjaji, Bojan ;
Protsenko, Mykolai ;
de Meer, Hermann ;
Reiser, Hans P. .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2017, 6